From: Kilgallen@SpamCop.net (Larry Kilgallen)
Subject: Re: How unchecked conversion works?
Date: 16 Jan 2005 18:34:22 -0600
Date: 2005-01-16T18:34:22-06:00 [thread overview]
Message-ID: <4zSInARGfY3p@eisner.encompasserve.org> (raw)
In-Reply-To: 8PwGd.8282$pZ4.6177@newsread1.news.pas.earthlink.net
In article <8PwGd.8282$pZ4.6177@newsread1.news.pas.earthlink.net>, Jeffrey Carter <spam@spam.com> writes:
> He had achieved everything except there was one small covert channel
> available. A trusted user could set up a program that created a lot of
> processes when it wanted to transmit a one, and no processes to transmit
> a zero. The untrusted recipient would create a process from time to time
> and see how many processes had been created, since process IDs were
> sequential.
Analysis of such covert storage channels is actually required for
any assurance level above B1, not just for A1.
http://www.atis.org/tg2k/_covert_storage_channel.html
> It seems to me that this system was a success. Nothing stops the trusted
> person from memorizing a block of data, going out of the secure area,
> writing it down, and giving it to the recipient.
But the person doing that would know they were doing that. No computer
system can prevent a human from releasing information they know, even if
they have to carry one bit a day out of the workplace based on which of
their pockets they use to store their wallet.
A trusted system (at the proper evaluation level) will prevent the person
from _inadvertantly_ releasing information, such as by running a trojan
horse spreadsheet program that performed the modulation you describe.
next prev parent reply other threads:[~2005-01-17 0:34 UTC|newest]
Thread overview: 24+ messages / expand[flat|nested] mbox.gz Atom feed top
2005-01-13 18:54 How unchecked conversion works? None
2005-01-13 21:22 ` Frank J. Lhota
2005-01-13 22:28 ` Keith Thompson
2005-01-14 0:17 ` Larry Kilgallen
2005-01-14 15:23 ` None
2005-01-14 15:55 ` Marius Amado Alves
2005-01-14 22:29 ` Keith Thompson
2005-01-14 23:15 ` Marius Amado Alves
2005-01-15 1:27 ` Keith Thompson
2005-01-15 2:15 ` Larry Kilgallen
2005-01-15 10:24 ` Marius Amado Alves
2005-01-15 12:02 ` Larry Kilgallen
2005-01-15 16:54 ` Nick Roberts
2005-01-16 16:14 ` Larry Kilgallen
2005-01-16 16:41 ` Jeffrey Carter
2005-01-16 20:52 ` TCSEC security levels [was: How unchecked conversion works?] Nick Roberts
2005-01-17 15:57 ` Larry Kilgallen
2005-01-17 0:34 ` Larry Kilgallen [this message]
2005-01-17 1:29 ` How unchecked conversion works? Jeffrey Carter
2005-01-17 4:20 ` Larry Kilgallen
2005-01-15 18:24 ` Jeffrey Carter
2005-01-14 16:52 ` Mark H Johnson
2005-01-14 22:27 ` Keith Thompson
2005-01-14 22:49 ` Stephen Leake
replies disabled
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox